• Title/Summary/Keyword: Computer control

Search Result 11,889, Processing Time 0.041 seconds

Maximum Output Control of Cage-Type Induction Generator for Wind Power Generation (풍력발전용 농형유도발전기의 최대출력제어)

  • Koo, Seoung-Young;Lee, Dong-Choon
    • Proceedings of the KIEE Conference
    • /
    • 2001.04a
    • /
    • pp.288-292
    • /
    • 2001
  • In this paper, a maximum power control of a low-cost and rugged cage-type induction generator system is proposed, where the machine-side PWM converter is used for maximum power generation and field excitation control, and the line-side PWM inverter is used for the dc link voltage control and source-side power factor control. Simulation results through Matlab Simulink have been demonstrated.

  • PDF

Statistical Process Control Software developed by MS-EXCEL and Visual Basic (MS-EXCEL과 Visual Basic으로 개발한 통계적 공정관리 소프트웨어)

  • Han, Kyung-Soo;Ahn, Jeong-Yong
    • Journal of Korean Society for Quality Management
    • /
    • v.24 no.2
    • /
    • pp.172-178
    • /
    • 1996
  • In this study, we developed a software for statistical process control. This software presents $\bar{x}$, R, CUSUM, EWMA control chart and process capability index. In this system, statistical process control methods are integrated into the automated method on a real time base. It is available in process control of specified type and can be performed on personal computer with network system.

  • PDF

An Energy-Efficient Access Control Scheme forWireless Sensor Networks based on Elliptic Curve Cryptography

  • Le, Xuan Hung;Lee, Sung-Young;Butun, Ismail;Khalid, Murad;Sankar, Ravi;Kim, Miso Hyoung-Il;Han, Man-Hyung;Lee, Young-Koo;Lee, Hee-Jo
    • Journal of Communications and Networks
    • /
    • v.11 no.6
    • /
    • pp.599-606
    • /
    • 2009
  • For many mission-critical related wireless sensor network applications such as military and homeland security, user's access restriction is necessary to be enforced by access control mechanisms for different access rights. Public key-based access control schemes are more attractive than symmetric-key based approaches due to high scalability, low memory requirement, easy key-addition/revocation for a new node, and no key predistribution requirement. Although Wang et al. recently introduced a promising access control scheme based on elliptic curve cryptography (ECC), it is still burdensome for sensors and has several security limitations (it does not provide mutual authentication and is strictly vulnerable to denial-of-service (DoS) attacks). This paper presents an energy-efficient access control scheme based on ECC to overcome these problems and more importantly to provide dominant energy-efficiency. Through analysis and simulation based evaluations, we show that the proposed scheme overcomes the security problems and has far better energy-efficiency compared to current scheme proposed byWang et al.

Development of a Rapid Control Prototyping System Based on Matlab and USB DAQ boards (Matlab과 USB DAQ 장치를 이용한 Rapid Control Prototyping System 개발)

  • Lee, Young-Sam;Yang, Ji-Hyuk;Kim, Seuk-Yun;Kim, Won-Sik;Kwon, Oh-Kyu
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.18 no.10
    • /
    • pp.912-920
    • /
    • 2012
  • In this paper, we propose a new and cost-effective RCP (Rapid Control Prototyping) system based on Matlab/Simulink and a DAQ (Data Acquisition) unit with the high speed USB communication interface. The proposed RCP system has a feature that a computer on which Simulink is running acts as a realtime controller and a DAQ unit performs data acquisition, transmission of the data to and from a computer, and the application of control data received from the computer. For its implementation, we develop 10 communication blocks each of which is constructed by using S-function. In order to increase the data communication speed and thus to reduce the sampling period of the overall control system, we propose to use a batch transfer strategy through the USB interface. The proposed RCP system has several advantages over existing methods such as good maintainability, portability due to the USB interface, low cost, and no necessity for C-code generation even though it can only be applied to control systems with moderate sampling rates. It is expected that the proposed RCP system can be useful in teaching control-related topics to undergraduate and graduate students.

An Improved Predictive Control of an Induction Machine fed by a Matrix Converter for Torque Ripple Reduction (토크 리플 저감을 위한 매트릭스 컨버터 구동 유도 전동기의 향상된 예측 제어 기법)

  • Lee, Eunsil;Choi, Woo Jin;Lee, Kyo-Beum
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.21 no.7
    • /
    • pp.662-668
    • /
    • 2015
  • This paper presents an improved predictive control of an induction machine fed by a matrix converter using N-switching vectors as the control action during a complete sampling period of the controller. The conventional model predictive control scheme based matrix converter uses a single switching vector over the same period which introduces high torque ripple. The proposed switching scheme for a matrix converter based model predictive control of an induction machine drive selects the appropriate switching vectors for control of electromagnetic torque with small variations of the stator flux. The proposed method can reduce the ripple of the electrical variables by selecting the switching state as well as the method used in the space vector modulation techniques. Simulation results are presented to verify the effectiveness of the improved predictive control strategy for induction machine fed by a matrix converter.

The Development of Computer Integrated Safety Diagnosis System for Press Process (PRESS 공정의 컴퓨터 통합 안전 진단시스템 구축에 관한 연구)

  • 강경식;나승훈;김태호
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.18 no.36
    • /
    • pp.175-182
    • /
    • 1995
  • Industrial safety management program can be divided three part that is education, technology, and management. The effectiveness of a industrial safety management program depends on the ability to manage hardware which is technology and software, education and management, In this research, it will be described that how to design and develop Computer Integrated Safety System and Computer Based Training System for Press operations which is how to integrated industrial safety program wi th production planning and control in order to control efficiently using personnel computer system.

  • PDF

Design & Implementation of Visualization Simulator for Supporting to Learn on Concurrency Control based on 2PLP (2PLP 기반 병행제어 학습을 지원하는 시각화 시뮬레이터의 설계 및 구현)

  • Han, Sang-Hun;Jang, Hong-Jun;Jung, Soon-Young
    • The Journal of Korean Association of Computer Education
    • /
    • v.11 no.4
    • /
    • pp.71-83
    • /
    • 2008
  • The recent advances of the information technology have motivated lots of research efforts to develop new computer-aided teaching and learning methodologies on various computer science topics, such as data structures, operating system, computer networks, and computer architecture. However, there have been only few studies to educate the database subject although it is one of the most important topics in the computer science. Specifically, among the various issues in the database subject, a learner often suffers to understand the mechanism of the concurrency control and recovery of database transaction in the database because it highly interacts with other functions in the database. Obviously, an intelligent visualization tool can help a learner to understand the process of the concurrency control and the recovery of database transaction. The purpose of this study is to develop an efficient visualization tool which can help users understand the two phase locking protocol (2PLP)-based concurrency control. Specifically, this visualization tool is designed to encourage a users' participation and raise their interest by visualizing the process of transactions and allowing users to specify and manipulate their own transactions.

  • PDF

Verification Control Algorithm of Data Integrity Verification in Remote Data sharing

  • Xu, Guangwei;Li, Shan;Lai, Miaolin;Gan, Yanglan;Feng, Xiangyang;Huang, Qiubo;Li, Li;Li, Wei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.2
    • /
    • pp.565-586
    • /
    • 2022
  • Cloud storage's elastic expansibility not only provides flexible services for data owners to store their data remotely, but also reduces storage operation and management costs of their data sharing. The data outsourced remotely in the storage space of cloud service provider also brings data security concerns about data integrity. Data integrity verification has become an important technology for detecting the integrity of remote shared data. However, users without data access rights to verify the data integrity will cause unnecessary overhead to data owner and cloud service provider. Especially malicious users who constantly launch data integrity verification will greatly waste service resources. Since data owner is a consumer purchasing cloud services, he needs to bear both the cost of data storage and that of data verification. This paper proposes a verification control algorithm in data integrity verification for remotely outsourced data. It designs an attribute-based encryption verification control algorithm for multiple verifiers. Moreover, data owner and cloud service provider construct a common access structure together and generate a verification sentinel to verify the authority of verifiers according to the access structure. Finally, since cloud service provider cannot know the access structure and the sentry generation operation, it can only authenticate verifiers with satisfying access policy to verify the data integrity for the corresponding outsourced data. Theoretical analysis and experimental results show that the proposed algorithm achieves fine-grained access control to multiple verifiers for the data integrity verification.

Development of a Preliminary Formation-Flying Testbed for Satellite Relative Navigation and Control

  • Park, Jae-Ik;Park, Han-Earl;Shim, Sun-Hwa;Park, Sang-Young;Choi, Kyu-Hong
    • Bulletin of the Korean Space Science Society
    • /
    • 2008.10a
    • /
    • pp.26.3-26.3
    • /
    • 2008
  • This research develops a GPS-based formation-flying testbed (FFTB) for formation navigation and control. The FFTB is a simulator in which spacecraft simulation and modeling software and loop test capabilities are integrated for test and evaluation of spacecraft navigation and formation control technologies. The FFTB is composed of a GPS measurement simulation computer, flight computer, environmental computer for providing true environment data and 3D visualization computer. The testbed can be simulated with one to two spacecraft, thus enabling a variety of navigation and control algorithms to be evaluated. In a formation flying simulation, GPS measurement are generated by a GPS measurement simulator to produce pseudorange, carrier phase measurements, which are collected and exchanged by the flight processors and subsequently processed in a navigation filter to generate relative and/or absolute state estimates. These state estimates are the fed into control algorithm, which are used to generate maneuvers required to maintain the formation. In this manner, the flight processor also serves as a test platform for candidate formation control algorithm. Such maneuvers are fed back through the controller and applied to the modeled truth trajectories to close simulation loop. Currently, The FFTB has a closed-loop capability of simulating a satellite navigation solution using software based GPS measurement, we move forward to improve using SPIRENT GPS RF signal simulator and space-based GPS receiver

  • PDF

A strategy for effectively applying a control flow obfuscation to programs (제어 흐름 난독화를 효과적으로 수행하기 위한 전략)

  • Kim, Jung-Il;Lee, Eun-Joo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.6
    • /
    • pp.41-50
    • /
    • 2011
  • Code obfuscation has been proposed to protect codes in a program from malicious software reverse engineering. It converts a program into an equivalent one that is more difficult to understand the program. Code obfuscation has been classified into various obfuscation technique such as layout, data, control, by obfuscating goals. In those obfuscation techniques, control obfuscation is intended to complicate the control flow in a program to protect abstract information of control flow. For protecting control flow in a program, various control obfuscation transformation techniques have been proposed. However, strategies for effectively applying a control flow obfuscation to program have not been proposed yet. In this paper, we proposed a obfuscation strategy that effectively applies a control flow obfuscation transformation to a program. We conducted experiment to show that the proposed obfuscation strategy is useful for applying a control flow transformation to a program.